Published on: 31 January 2024
Multiple vulnerabilities are found in all versions of the Linux GNU C Library (glibc) from version 1.04 to the latest release version 2.38. A local authenticated attacker may leverage the vulnerabilities to escalate its privilege or cause denial of service on a vulnerable system.
It is strongly recommended to consult the vendors if the Linux systems in use are affected.
Successful exploitation could lead to denial of service or elevation of privilege on an affected system.
The vulnerabilities are fixed in some of the affected Linux distributions such as Debian. The following is only a sample list of Linux distributions that are affected. The list is not exhaustive and it is strongly recommended to consult the vendors if the Linux systems in use are affected. System administrators should check with the vendors to confirm if their Linux systems are affected and the availability of patches, and if so, apply the patches or follow the recommendations provided by the vendors to mitigate the risk.
- Debian
https://security-tracker.debian.org/tracker/CVE-2023-6246
https://security-tracker.debian.org/tracker/CVE-2023-6779
https://security-tracker.debian.org/tracker/CVE-2023-6780